{ "id": "CVE-2024-2961", "sourceIdentifier": "3ff69d7a-14f2-4f67-a097-88dee7810d18", "published": "2024-04-17T18:15:15.833", "lastModified": "2024-06-10T18:15:30.657", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.\n" }, { "lang": "es", "value": "La funci\u00f3n iconv() en las versiones 2.39 y anteriores de la librer\u00eda GNU C puede desbordar el b\u00fafer de salida que se le pasa hasta en 4 bytes al convertir cadenas al juego de caracteres ISO-2022-CN-EXT, lo que puede usarse para bloquear una aplicaci\u00f3n. o sobrescribir una variable vecina." } ], "metrics": {}, "weaknesses": [ { "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-787" } ] } ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/04/17/9", "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18" }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/18/4", "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18" }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/24/2", "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18" }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/27/1", "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18" }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/27/2", "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18" }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/27/3", "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18" }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/27/4", "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18" }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/27/5", "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18" }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/27/6", "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18" }, { "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html", "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/", "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/", "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/", "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18" }, { "url": "https://security.netapp.com/advisory/ntap-20240531-0002/", "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18" }, { "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004", "source": "3ff69d7a-14f2-4f67-a097-88dee7810d18" } ] }